waves
ball1 ball2 ball3 ball4

Is Your Data Safe? The Zoomcar India Breach (June 2025)

Data breaches have become important alerts in today's hyperconnected world, not just news stories. One such wake-up call happened on June 9, 2025, when Zoomcar, an established car rental website in India, faced a major data breach. This breach, that exposed over 8.4 million user records, brought...

What Microsoft’s July 2025 Security Patch Signals About Enterprise Readiness

Microsoft’s July 2025 Patch Tuesday was more impactful than usual. The release resolved over 137 vulnerabilities, including 14 that were deemed critical and one highly sensitive zero-day in Microsoft SQL Server (CVE-2025-49719) that had previously been made public. This update is a huge wake-up...

1 Cyber Valley turns 4! A special interview with Vishal Jain

Vishal Jain, General Manager at 1 Cyber Valley, is reflecting on his remarkable one-year journey as the company celebrates its 4th anniversary. Over the past year, Vishal has played a pivotal role in driving innovation, strengthening client relationships, and enhancing cybersecurity solutions to...

PCI DSS 4.0: New Requirements

Payment Card Industry Data Security Standard (PCI DSS) v4.0 is the exclusive version that brings many new conditions and features within its functioning. The PCI Security Standards Council (PCI SSC) issued the latest version 4.0 on 31st March 2022. The aim of PCI DSS 4.0 is to add more compliance...

PCI DSS v4: The Defined Approach and Customised Approach - What's The Difference?

The defined and customised approaches are something we must all deem necessary in thought when thinking about validating requirements. With the new introduction of version 4 into the realm we have so firmly built within PCI, defined, and customised approaches are now something we must all work with...

Anti-Phishing Services: How You Can Protect Your Organization

Phishing, a form of social engineering, is often used by cyber criminals to mimic trusted entities and create a sense of urgency to manipulate people into carrying out actions they would not do unprovoked. For example, attackers may send scam emails or text messages that contain links to malicious...

PCI DSS Compliance: Your Merchant Level and Best Practices for Success

It’s hard to believe the payment card industry data security standard (PCI DSS) is 16 years old at this point. Although it’s experienced different updates and iterations over the years, this standard has provided an industry-defined payment processing and data storage framework for more than a...

How to plan a penetration Test

I. Introduction In today’s fast-changing threat landscape, businesses are struggling to deliver values to their customers and to protect consistently their assets. Security experts are constantly running after the attackers, and defending their systems can no longer be done by just installing a...